Applied Cryptography: Protocols, Algorithms, and Source Code in C (Record no. 49954)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01582 a2200229 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250407160301.0 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119096726 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 SCH |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Schneier, Bruce |
245 ## - TITLE STATEMENT | |
Title | Applied Cryptography: Protocols, Algorithms, and Source Code in C |
250 ## - EDITION STATEMENT | |
Edition statement | 20th Anniversary Edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | John Wiley & Sons |
Date of publication, distribution, etc | 2015 |
Place of publication, distribution, etc | Indianapolis, IN |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 758 |
520 ## - SUMMARY, ETC. | |
Summary, etc | From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Telecommunication-Security Measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Protocols |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Source Code in C |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Source of classification or shelving scheme | Dewey Decimal Classification |
No items available.